An Accurate and Efficient System for Segmenting Machine-Printed Text. Yi Lu, Beverly Haist, Laurel Harmon, John Trenkle and Robert Vogt

Size: px
Start display at page:

Download "An Accurate and Efficient System for Segmenting Machine-Printed Text. Yi Lu, Beverly Haist, Laurel Harmon, John Trenkle and Robert Vogt"

Transcription

1 An Accurate and Efficient System for Segmenting Machine-Printed Text Yi Lu, Beverly Haist, Laurel Harmon, John Trenkle and Robert Vogt Environmental Research Institute of Michigan P. O. Box Ann Arbor, MI ABSTRACT In this paper we present a system that segments machine-printed text of various fonts, styles and sizes for the Roman alphabet and numerals. The system consists of four major computational modules: multiline processing, single line processing, structural analysis, and merged-character splitting. The multiline process is designed to segment fixed-pitch text and is especially effective for broken and dot matrix characters. The process is based on the inherent property of fixed-pitch fonts that gaps must occur at fixed intervals in lines of text. The single line processing, structural analysis and the splitting modules are designed for segmenting proportional pitch text. The single line processing consists of procedures such as vertical projection based segmentation and grouping broken characters. The structural analysis is designed to segment kerned characters, punctuation marks, and also to group broken characters and characters with more than one component. The splitting module is designed to split touched and merged characters in proportional and/or serif fonts. The proposed segmentation system is evaluated using actual address block images from the U.S. mail stream. 1. Introduction Character segmentation is a technique which partitions images of lines or words into individual characters. In most OCR systems, character recognition performs on individual characters. Character segmentation is fundamental to character recognition approaches which rely on isolated characters. It is a critical step because incorrectly segmented characters are not likely to be correctly recognized. Character segmentation is all too often ignored in research community, yet broken characters and touching characters are responsible for the majority errors in automatic reading of both machine-printed and hand printed text[2]. The complexity of

2 character segmentation stems from the wide variety of fonts, rapidly expanding text styles, and address image characteristics such as poor-quality printers, including sparse dot matrix printers. It is desirable to develop segmentation techniques which are styleindependent[1]. However, it is also reasonable to develop methods which are specialized for handling broad categories of character segmentation situations, such as those listed below (in order of increasing difficulty). Uniformly spaced characters, i.e. fixed-pitch fonts. Well-separated and unbroken characters, not uniformly spaced. Broken characters. Touching characters. Broken and touching characters. Broken and italic characters. Touching and italic characters. Script characters. In this paper, we present a system that segments machine-printed text of various fonts. It is designed to segment the text falling into the first five categories listed above. The segmentation system has the following distinct features: Characterization. The segmentation system is designed to exploit any available information about the image, print, and font characteristics. Processes at earlier stages of the system are less computationally complex than those at the later stages. The early stages are designed to segment the bulk of address block images accurately and efficiently. Processes at later stages require more computational time and are designed to process only the more difficult cases. Prediction. Font-dependent statistics are collected and estimated during the segmentation processes. They are used to predict the locations of break points between characters, and to group broken characters. Statistics are calculated throughout the segmentation process for the character intervals, widths, and gaps, as illustrated in Figure 1. Validation. The control structure of the segmentation system is dictated by the success of the segments. The output segments

3 generated by various segmentation modules are further validated by various decision criteria. If segments pass the decision criteria, they are sent to the recognition system; otherwise, the line image is sent to the other modules in the segmentation system. Section 2 gives an overall view of the system and its individual process modules. The proposed segmentation system has been evaluated using actual address block images from the U.S. mail stream. Section 3 presents the test results of the segmentation system, and error analysis. The test results will show that the segmentation system is highly efficient, accurate, and robust. 2. ERIM Segmentation System The segmentation system encompasses four major computational modules: multiline processing, single-line processing, structural analysis, and model based splitting. The system flowchart is shown in Figure 2. The multiline process is designed to segment fixed-pitch text and is especially effective for broken characters and characters in dot matrix style. The process is based on the inherent property of fixed-pitch fonts that gaps must occur at fixed intervals in lines of text. It is highly efficient since it operates on groups of line images. The single line processing, structural analysis and the splitting modules are designed for segmenting proportional pitch text. Singleline processing segments characters based on single line vertical projections combined with statistical analysis. It has two merging processes, sequential merging and grouping broken characters based on estimated character widths. The structural analysis module is based on the analysis of neighboring components in a candidate for segmentation. The analysis is based on occupancy ratio, size of components, relative locations, distance between the neighboring components, and locations of components with respect to baseline and the top of the corresponding line image in the text. The structural analysis is successful in segmenting kerned characters, punctuation, and also in grouping broken characters and characters with more than one component. The splitting module is designed to split touching and merged characters in proportional or serif fonts. It uses a peak-to-valley function to find the possible splitting locations. A statistical analysis based on character width, height, and ex-height of the line is followed to find the optimal splitting locations.

4 2.1 Multiline process Two algorithms were developed at the multiline process level: multiline vertical projection and gap periodic detection. We assume that the address block (AB) image has already been segmented into lines. Both modules are aimed at segmenting address images with uniform spacing. Our initial analysis of 642 address block images found that 67.5% have uniform spacing, and 2.3% of the images had a logo or a different font with the remaining lines possessing uniformly spaced characters (see Figure 3). The motivation of the multiline process is to use the cumulative vertical projection to overcome errors or uncertainties in the single line projection. (Figure 6, below, is a good example.) The single line projection shows gaps within characters, but the multiline projection shows only the gaps between characters Multiline vertical projection. In order to simultaneously segment lines of the same font, the multiline vertical projection algorithm begins by grouping lines with similar ex-heights (see Figure 4 for definition). For each group of lines, a multiline projection is formed from the single-line vertical projections. Then, statistics over the multiline projection are computed to the end of the second longest line. This assures that most of the regions are made up of more than one line, which helps to estimate the statistics more accurately. A decision procedure is invoked to determine whether the multiline group will be accepted or sent to further segmentation processes. The decision procedure checks the character width, gap, and interval statistics. If the statistics are within certain ranges, merging and splitting procedures are invoked to segment the last part of the longest line. The merging process uses the interval, width, and gap statistics to combine small neighboring regions. The splitting process splits any region that is greater than a maximum width, which is determined dynamically. If the variances are outside of the acceptable range, but the group is still deemed uniform, a merging or splitting process based on the estimated sum of the character width and gap is applied to regions of the group vertical projection. If the statistics indicate the text is not uniformly spaced, a merging process based on estimated character width and gap is applied to the entire multiline projection in an attempt to group broken characters. The statistics are recomputed after the merging and splitting processes. The decision module is

5 applied again. If the multiline group is accepted at this level then the segmentation is applied to all of the lines in the group, otherwise each line image in the group is sent to the single line process. Figure 3 shows an example of multigroups in an address block image. The multiline process successfully segmented all groups. The multiline segmentation module is especially effective for broken characters and characters in dot matrix style. Figures 5 and 6 show that multiline segmentation can overcome difficulties encountered in a single line projection. The image in Figure 5 is in dot matrix style, and illustrates the difference between multiline and single line processing. Figure 6 shows an image containing broken characters, and its multiline projection. The multiline process successfully segmented the image based on the multiline projection GPD algorithm The gap periodicity detection (GPD) algorithm exploits the fact that gaps must appear at periodic intervals in a fixed pitch font, but not in a proportionally pitched font. First, the approach uses the vertical projection of the address block (or line of text) to determine the best single offset and pitch combination for the address block. The pitch estimation is computed based on the mean gap length and the mean run length of the inverted vertical projection. If the variance in the estimates for these two values is above an empirically determined threshold then the AB (or group) is passed on to other segmentation modules. If the estimated pitch is much greater than the mean line height then the AB image is also passed on to the other modules. Based on the estimated pitch, the algorithm cycles through potential combinations of pitch and offset, which are evaluated by a measure of the goodness of the resulting cuts. The distance from the beginning of the inverted vertical projection to the first line is the current offset and the distance between each line is the current pitch. Figure 7 illustrates a dot matrix image successfully segmented by the GPD algorithm. Figure 8 shows an image that contains proportionally pitched text. The GPD detects that the text is not fixed pitch and passes this image on to other methods for character segmentation. 2.2 Single-Line Process

6 This module is designed to segment characters that are wellseparated but which cannot be grouped with other lines on the basis of ex-height. It consists of an estimation procedure, a sequential merging procedure, a grouping procedure based on the estimated character width, and a decision procedure. The Single Line process uses the vertical projection of a single line image. The first step is to segment the line into regions based on the vertical projection as illustrated in Figure 9. Statistics are then calculated for the character intervals, widths, and gaps over these regions. Although the majority of dot matrix images are processed at the multiline level, a few of them can be passed to the single line processing level due to noise and/or poor printing quality. An estimation procedure is designed to estimate whether a line image is in dot matrix style. The decision is based on the number of region widths and gap widths that are smaller than a threshold. If a line image is estimated to be in dot matrix style, then a sequential merging procedure is invoked. The sequential merging begins by combining neighboring regions with the smallest gap. Statistics are then recomputed and the next smallest gap is used to merge the neighboring regions. This process continues until the statistics are within an acceptable range. If the line image was estimated to be proportionally-spaced style and the statistics are not within an acceptable range, then a merging procedure is invoked to merge small neighboring regions with small gaps. It uses the estimated character width and gap to merge the neighboring regions. If the neighboring regions are small and the total width after being combined is less than a maximum threshold, the regions are candidates to be merged. The maximum threshold is computed dynamically. Figure 10 shows an example generated by this the merging process. The characters O, L, u, D and v are composed of merged regions. As part of the merging process, a character analysis routine was incorporated to avoid merging narrow characters, such as ll, ti, ri, il, ff. The routine analyzes neighboring regions to determine whether they represent two separate characters. The analysis is based on the relative heights of the regions and the occupancy ratio. If the conditions for separate characters are met, the two regions are not joined.

7 The statistics are recomputed after the merging process and a decision module is invoked. The decision module checks the character width, gap, and interval statistics to determine whether they are within an acceptable range. If the segmentation result is accepted, the output is the segmented characters. If it is rejected, the regions are sent to the Structural Analysis module. 2.3 Structural Analysis The regions that are rejected by the Single Line Process may contain more than one character, either overlapping or touching. Structural Analysis is designed to segment overlapping (kerned) characters ( VA ), characters in Italic fonts ( IN ), and punctuation marks ( P. ). However it must also avoid separating multiple character components, as found in two stroke characters: ( i, j ), and in broken characters. This module is based on the analysis of neighboring components. Two computational steps are needed: generalized connected components and structural analysis of neighboring components. The generalized connected components process computes the different components within a region. The process is based on a classic connected components method with certain modifications: it optimizes the search by using runs, and it allows for a 2 pixel gap in both the x and y directions. Structural analysis of neighboring components consists of two major procedures: kerned character analysis and punctuation detection. The combination of these two procedures groups broken characters and two-stroke characters, and separates kerned characters and punctuation marks from the neighboring characters. Kerned character analysis is designed to group broken or two-stroke characters and to separate kerned characters. The font illustrated in Figure 11 is kerned. The characters TA and PA are overlapping. Kerned character analysis can easily separate these regions. In order to accomplish this, every two neighboring components are examined for vertical overlap and possible grouping. If the degree of overlap exceeds a threshold, the components are candidates to be joined. Because punctuation marks are frequently overlapped by the preceding character, a punctuation detection procedure was developed.

8 The punctuation detection procedure determines whether the second of the two neighboring components is a punctuation mark. The analysis is based on the occupancy ratio, size of components, relative locations, distance between the neighboring components, and locations of components with respect to the base and the top-base line of the line. If the second component is determined to be a punctuation mark, then it is not joined, as depicted in Figure 12 (see W. and P. ). The punctuation marks detected by this procedure are period, comma, colon and semi-colon. 2.4 Splitting Merged Characters All of the previously-described modules at the single line level were designed to segment characters that are not touching. The final module addresses the last problem of character segmentation: splitting touching or merged characters. The Splitting module is aimed at splitting touching/merged characters in uniform, proportional and/or serif fonts. The module is based on the analysis of a region s vertical projection, peak-to-valley function and the estimated character width. The key issue in the splitting module is to determine where to split the large regions. It is based on the estimated character width and a generalized differential technique. The generalized differential technique is a modified version of the second derivative method proposed by Kahan and Pavlidis[3]. The vertical projection of the region is mapped to a second projection, called the peak-to-valley ratio, by applying a generalized differential technique. The peak-tovalley function is illustrated in Figure 13. Sharp minima in the vertical projection are represented as maxima in the peak-to-valley ratio (shown in Figure 14). These maxima are then considered as potential break points between the merged characters. Splitting locations are determined from both the maxima in the peak-to-valley function and the estimated character width. The process first determines a allowable splitting region based on the estimated character width. The position of the maximum within the splitting region is the splitting location. Then the widths of the two subregions separated by the splitting location are examined. If a subregion has an acceptable size, it is considered to be a character and accepted. If the width of a subregion is large enough to contain more than one character, the search for a splitting location in the subregion is performed again. If no maxima exist within the splitting

9 regions, the process rejects the region. Figure 15 illustrates splitting locations found within splitting regions. Two splitting regions (SR) are located in the peak-to-valley function. S1 and S2 are the first and second splitting locations found within the two splitting regions. 3. System Performance This section describes an evaluation of the character segmentation system presented above. The system was trained on a training data set of 1000 gray scale address block images, and tested on the a data set of 492 gray scale address block images. Input to the segmentation sytem consisted of line and field (word) boundaries and the binarized images. The output of the character segmentation system is a state-labeled image in which pixels corresponding to individual segments in the same field are given unique labels. These state-labeled images were then used in scoring and error analysis. For the handful of images in which the line or field boundaries were found to be in serious error, the segmentation algorithms were rerun after corrections. As part of the error analysis, all errors in the test set were reviewed and categorized. We used an interactive software to score the segmentation results. This software used an X-Window graphical user interface to present the scorer with the state-labeled image produced by the character segmentation system. Any field with a disparity between the number of segments and the number of characters in the corresponding word in the truth file is automatically flagged on the screen. Other types of error are detected by the scorer. The scorer reviews each segmentation error and records the number of occurrences of each type of error using buttons in the interface designed for this purpose. Once the review is complete the results are saved to a file. The scoring criteria are based on the following definitions: Correct: a segment contains a complete character without any extraneous components. Oversegment: a segment contains a partial character. Undersegment: a segment contains more than one character.

10 Figure 16 illustrates the definitions of oversegment and undersegment: (a) is undersegmented and it is scored as 2 errors in undersegment count; (b) is oversegmented, and it is scored as 1 error in oversegment count; and (c) is a combination of under and over segmentation. It is scored as 1 undersegment error and 1 oversegment error. Table 1 presents the segmentation results on both training and test sets. In the training set, there were characters. Of these, were from Alpha fields, from mixed fields, 9530 from ZIP fields and 6287 non-zip numerals. The test set contained characters, from Alpha fields, 5119 from mixed fields, 3060 from Zip Code fields and 1970 non-zip numerals. The results from the two sets are comparable: 97.53% correct segments from the training set and 97.44% correct segments from the test set. This indicates that the segmentation system is quite robust. We did a further test by eliminating the characters with crossing lines and underlines in the test set and achieved 98.6% correct segmentation. The segmentation results on the test set at the address-block level are plotted in Figure 17. The bottom curve shows the percentage of address blocks correctly segmented, and the top curve is the cumulative function. The results of the segmentation system are summarized as follows. Correctly segmented characters: 97.53% Training 97.44% Test Eliminating characters with crossing lines: 98.6% Test Correct segmentation per address block 81.22% AB Segmented 100% correctly 93.26% AB Segmented over 90% correctly Address block images segmented less than 70% correctly were all caused by crossing lines. All images with errors in the test set were examined and categorized. Two images were segmented under 70% correctly. Of these, 1 had merged italic characters and 1 had touching script characters. Three images were segmented between 70% and 80% correctly, one with touching scripts and two with merged characters. Images segmented

11 correctly between 80% and 99% were mostly due to poor image quality, combinations of broken and touching characters, and characters in proportional fonts and serif fonts. 4. Conclusion We have described a character segmentation system developed for machine-printed addresses. It has multiple levels of processing. The processes at the front are efficient and accurate, aimed at segmenting relatively simple cases. The later processes are more complicated, aimed at segmenting proportional fonts, broken characters and merged characters. The system uses statistical and structural analysis combined with multiline and single line vertical projections, peak-and-valley functions, estimated character pitch, line image height and ex-height. We have also presented the results of a system test and error analysis. Most of the errors are caused by underlines and crossing lines, and merged characters in Italic style, which were not in the domain of the system. The test results show the segmentation system is efficient, effective and robust at segmenting machine-printed line images into characters. 5. Acknowledgments This work was sponsored by the Office of Advanced Technology (OAT), United States Postal Service, under Task Order H All imagery used in the work was provided by the United States Postal Service.

12 6. REFERENCES [1] D. G. Elliman and I. T. Lancaster, "A Review of Segmentation and Contextual Analysis Techniques for Text Recognition," Pattern Recognition, Vol. 23, PP , [2] R. L. Hoffman and J. W. Mccullough, "Segmentation Methods for Recognition of Michine-printed Characters," IBM Journal of Research and Development, pp , March [3] S. Kahan and T. Pavlidis, " On the Recognition of Printed Characters of Any Font and Size," IEEE Trans. Patt. Anal. Machine Intell., Vol. PAMI-9, pp , March [4] Y. Tsuji and K. Asai, "Adaptive Character Segmentation Method Based on Minimum Variance Criterion," Systems and Computers in Japan, Vol. 17, No. 7, A B C D E interval width gap Figure 1. Measurements for which statistics are accumulated.

13 multiline process single line process structural analysis splitting module reject segmented image Figure 2. Segmentation system flowchart. Figure 3. The last two lines possessing uniformly spaced characters Ex-height Depth Ascenders descending Rise Baseline Figure 4. Ex-height, baseline, depth and rise are estimated from a full line image. (a) Multiline processing successfully segments broken text.

14 (b) The multiline projection shows gaps only between characters. (c) The vertical projections of individual lines have gaps within characters. Figure 5. Multiline segmentation of an image in dot matrix style. Figure 6. Multiline segmentation of broken characters.

15 Figure 7. GPD applied to a fixed-pitch dot matrix AB Figure 8. GPD applied to a proportional pitch AB Figure 9. Broken characters may be oversegmented using a single line vertical projection. Figure 10. Merging of regions based on the single line projection recovers broken characters (compare with Figure 9).

16 Figure 11. Structural analysis module used to segment TA and PA. Figure 12. Detection of punctuation results in the separation of P. and W. Figure 13. The peak-to-valley function emphasizes local minima in the vertical projection. Figure 14. Potential breakpoints derived from the peak-to-valley function

17 Figure 15. Splitting regions (SR) and locations. LI W LM Undersegment Oversegment Combination of Under and Over Segmentation (a) (b) (c) Figure 16. Examples of segmentation scoring.

18 Table 1. Segmentation Results on the Phase I Test. Segmentation Results Training Set: Alpha Mixed Zip Non-Zip Combined N = ERIM Measures % Correct % OverSeg %UnderSeg Test Set: Alpha Mixed Zip Non-Zip Combined N = ERIM Measures % Correct % OverSeg %UnderSeg Cumulative Percentage of Address Blocks Percentage of AB Correctly Segmented Figure 17. Segmentation results on a per-address block basis.

19

An Efficient Character Segmentation Based on VNP Algorithm

An Efficient Character Segmentation Based on VNP Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:

More information

OPTIMIZING A VIDEO PREPROCESSOR FOR OCR. MR IBM Systems Dev Rochester, elopment Division Minnesota

OPTIMIZING A VIDEO PREPROCESSOR FOR OCR. MR IBM Systems Dev Rochester, elopment Division Minnesota OPTIMIZING A VIDEO PREPROCESSOR FOR OCR MR IBM Systems Dev Rochester, elopment Division Minnesota Summary This paper describes how optimal video preprocessor performance can be achieved using a software

More information

Representations and Metrics for Off-Line Handwriting Segmentation

Representations and Metrics for Off-Line Handwriting Segmentation Representations and Metrics for Off-Line Handwriting Segmentation Thomas M. Breuel PARC Palo Alto, CA, USA tbreuel@parc.com Abstract Segmentation is a key step in many off-line handwriting recognition

More information

Indian Multi-Script Full Pin-code String Recognition for Postal Automation

Indian Multi-Script Full Pin-code String Recognition for Postal Automation 2009 10th International Conference on Document Analysis and Recognition Indian Multi-Script Full Pin-code String Recognition for Postal Automation U. Pal 1, R. K. Roy 1, K. Roy 2 and F. Kimura 3 1 Computer

More information

A Labeling Approach for Mixed Document Blocks. A. Bela d and O. T. Akindele. Crin-Cnrs/Inria-Lorraine, B timent LORIA, Campus Scientique, B.P.

A Labeling Approach for Mixed Document Blocks. A. Bela d and O. T. Akindele. Crin-Cnrs/Inria-Lorraine, B timent LORIA, Campus Scientique, B.P. A Labeling Approach for Mixed Document Blocks A. Bela d and O. T. Akindele Crin-Cnrs/Inria-Lorraine, B timent LORIA, Campus Scientique, B.P. 39, 54506 Vand uvre-l s-nancy Cedex. France. Abstract A block

More information

Logical Templates for Feature Extraction in Fingerprint Images

Logical Templates for Feature Extraction in Fingerprint Images Logical Templates for Feature Extraction in Fingerprint Images Bir Bhanu, Michael Boshra and Xuejun Tan Center for Research in Intelligent Systems University of Califomia, Riverside, CA 9252 1, USA Email:

More information

Multi-scale Techniques for Document Page Segmentation

Multi-scale Techniques for Document Page Segmentation Multi-scale Techniques for Document Page Segmentation Zhixin Shi and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR), State University of New York at Buffalo, Amherst

More information

Processing and Others. Xiaojun Qi -- REU Site Program in CVMA

Processing and Others. Xiaojun Qi -- REU Site Program in CVMA Advanced Digital Image Processing and Others Xiaojun Qi -- REU Site Program in CVMA (0 Summer) Segmentation Outline Strategies and Data Structures Overview of Algorithms Region Splitting Region Merging

More information

Keyword Spotting in Document Images through Word Shape Coding

Keyword Spotting in Document Images through Word Shape Coding 2009 10th International Conference on Document Analysis and Recognition Keyword Spotting in Document Images through Word Shape Coding Shuyong Bai, Linlin Li and Chew Lim Tan School of Computing, National

More information

Text. Text metrics. There are some important metrics that we must consider when working with text. Figure 4-1 shows the basics.

Text. Text metrics. There are some important metrics that we must consider when working with text. Figure 4-1 shows the basics. Text Drawing text has some special properties and thus is treated in a separate chapter. We first need to talk about the sizing of text. Then we discuss fonts and how text is actually drawn. There is then

More information

Layout Segmentation of Scanned Newspaper Documents

Layout Segmentation of Scanned Newspaper Documents , pp-05-10 Layout Segmentation of Scanned Newspaper Documents A.Bandyopadhyay, A. Ganguly and U.Pal CVPR Unit, Indian Statistical Institute 203 B T Road, Kolkata, India. Abstract: Layout segmentation algorithms

More information

Recognition-based Segmentation of Nom Characters from Body Text Regions of Stele Images Using Area Voronoi Diagram

Recognition-based Segmentation of Nom Characters from Body Text Regions of Stele Images Using Area Voronoi Diagram Author manuscript, published in "International Conference on Computer Analysis of Images and Patterns - CAIP'2009 5702 (2009) 205-212" DOI : 10.1007/978-3-642-03767-2 Recognition-based Segmentation of

More information

Slant Correction using Histograms

Slant Correction using Histograms Slant Correction using Histograms Frank de Zeeuw Bachelor s Thesis in Artificial Intelligence Supervised by Axel Brink & Tijn van der Zant July 12, 2006 Abstract Slant is one of the characteristics that

More information

Operators-Based on Second Derivative double derivative Laplacian operator Laplacian Operator Laplacian Of Gaussian (LOG) Operator LOG

Operators-Based on Second Derivative double derivative Laplacian operator Laplacian Operator Laplacian Of Gaussian (LOG) Operator LOG Operators-Based on Second Derivative The principle of edge detection based on double derivative is to detect only those points as edge points which possess local maxima in the gradient values. Laplacian

More information

Use of Extreme Value Statistics in Modeling Biometric Systems

Use of Extreme Value Statistics in Modeling Biometric Systems Use of Extreme Value Statistics in Modeling Biometric Systems Similarity Scores Two types of matching: Genuine sample Imposter sample Matching scores Enrolled sample 0.95 0.32 Probability Density Decision

More information

Segmentation of Characters of Devanagari Script Documents

Segmentation of Characters of Devanagari Script Documents WWJMRD 2017; 3(11): 253-257 www.wwjmrd.com International Journal Peer Reviewed Journal Refereed Journal Indexed Journal UGC Approved Journal Impact Factor MJIF: 4.25 e-issn: 2454-6615 Manpreet Kaur Research

More information

A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script

A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script A Survey of Problems of Overlapped Handwritten Characters in Recognition process for Gurmukhi Script Arwinder Kaur 1, Ashok Kumar Bathla 2 1 M. Tech. Student, CE Dept., 2 Assistant Professor, CE Dept.,

More information

One Dim~nsional Representation Of Two Dimensional Information For HMM Based Handwritten Recognition

One Dim~nsional Representation Of Two Dimensional Information For HMM Based Handwritten Recognition One Dim~nsional Representation Of Two Dimensional Information For HMM Based Handwritten Recognition Nafiz Arica Dept. of Computer Engineering, Middle East Technical University, Ankara,Turkey nafiz@ceng.metu.edu.

More information

Time Stamp Detection and Recognition in Video Frames

Time Stamp Detection and Recognition in Video Frames Time Stamp Detection and Recognition in Video Frames Nongluk Covavisaruch and Chetsada Saengpanit Department of Computer Engineering, Chulalongkorn University, Bangkok 10330, Thailand E-mail: nongluk.c@chula.ac.th

More information

A New Algorithm for Detecting Text Line in Handwritten Documents

A New Algorithm for Detecting Text Line in Handwritten Documents A New Algorithm for Detecting Text Line in Handwritten Documents Yi Li 1, Yefeng Zheng 2, David Doermann 1, and Stefan Jaeger 1 1 Laboratory for Language and Media Processing Institute for Advanced Computer

More information

OCR For Handwritten Marathi Script

OCR For Handwritten Marathi Script International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,

More information

Robust line segmentation for handwritten documents

Robust line segmentation for handwritten documents Robust line segmentation for handwritten documents Kamal Kuzhinjedathu, Harish Srinivasan and Sargur Srihari Center of Excellence for Document Analysis and Recognition (CEDAR) University at Buffalo, State

More information

A Segmentation Free Approach to Arabic and Urdu OCR

A Segmentation Free Approach to Arabic and Urdu OCR A Segmentation Free Approach to Arabic and Urdu OCR Nazly Sabbour 1 and Faisal Shafait 2 1 Department of Computer Science, German University in Cairo (GUC), Cairo, Egypt; 2 German Research Center for Artificial

More information

Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script

Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script Galaxy Bansal Dharamveer Sharma ABSTRACT Segmentation of handwritten words is a challenging task primarily because of structural features

More information

DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM

DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM Anoop K. Bhattacharjya and Hakan Ancin Epson Palo Alto Laboratory 3145 Porter Drive, Suite 104 Palo Alto, CA 94304 e-mail: {anoop, ancin}@erd.epson.com Abstract

More information

Homework # 2 Due: October 6. Programming Multiprocessors: Parallelism, Communication, and Synchronization

Homework # 2 Due: October 6. Programming Multiprocessors: Parallelism, Communication, and Synchronization ECE669: Parallel Computer Architecture Fall 2 Handout #2 Homework # 2 Due: October 6 Programming Multiprocessors: Parallelism, Communication, and Synchronization 1 Introduction When developing multiprocessor

More information

Mathematical formula recognition using virtual link network

Mathematical formula recognition using virtual link network Mathematical formula recognition using virtual link network Yuko Eto Toshiba Corporation e-solution Company Suehiro-cho 2-9, Ome, Tokyo, 198-8710, Japan yuko.eto@toshiba.co.jp Masakazu Suzuki Faculty of

More information

A Statistical approach to line segmentation in handwritten documents

A Statistical approach to line segmentation in handwritten documents A Statistical approach to line segmentation in handwritten documents Manivannan Arivazhagan, Harish Srinivasan and Sargur Srihari Center of Excellence for Document Analysis and Recognition (CEDAR) University

More information

Section 2-2 Frequency Distributions. Copyright 2010, 2007, 2004 Pearson Education, Inc

Section 2-2 Frequency Distributions. Copyright 2010, 2007, 2004 Pearson Education, Inc Section 2-2 Frequency Distributions Copyright 2010, 2007, 2004 Pearson Education, Inc. 2.1-1 Frequency Distribution Frequency Distribution (or Frequency Table) It shows how a data set is partitioned among

More information

II. WORKING OF PROJECT

II. WORKING OF PROJECT Handwritten character Recognition and detection using histogram technique Tanmay Bahadure, Pranay Wekhande, Manish Gaur, Shubham Raikwar, Yogendra Gupta ABSTRACT : Cursive handwriting recognition is a

More information

Vision. OCR and OCV Application Guide OCR and OCV Application Guide 1/14

Vision. OCR and OCV Application Guide OCR and OCV Application Guide 1/14 Vision OCR and OCV Application Guide 1.00 OCR and OCV Application Guide 1/14 General considerations on OCR Encoded information into text and codes can be automatically extracted through a 2D imager device.

More information

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS 8.1 Introduction The recognition systems developed so far were for simple characters comprising of consonants and vowels. But there is one

More information

Classification of Fingerprint Images

Classification of Fingerprint Images Classification of Fingerprint Images Lin Hong and Anil Jain Department of Computer Science, Michigan State University, East Lansing, MI 48824 fhonglin,jaing@cps.msu.edu Abstract Automatic fingerprint identification

More information

Region-based Segmentation

Region-based Segmentation Region-based Segmentation Image Segmentation Group similar components (such as, pixels in an image, image frames in a video) to obtain a compact representation. Applications: Finding tumors, veins, etc.

More information

UW Document Image Databases. Document Analysis Module. Ground-Truthed Information DAFS. Generated Information DAFS. Performance Evaluation

UW Document Image Databases. Document Analysis Module. Ground-Truthed Information DAFS. Generated Information DAFS. Performance Evaluation Performance evaluation of document layout analysis algorithms on the UW data set Jisheng Liang, Ihsin T. Phillips y, and Robert M. Haralick Department of Electrical Engineering, University of Washington,

More information

Input sensitive thresholding for ancient Hebrew manuscript

Input sensitive thresholding for ancient Hebrew manuscript Pattern Recognition Letters 26 (2005) 1168 1173 www.elsevier.com/locate/patrec Input sensitive thresholding for ancient Hebrew manuscript Itay Bar-Yosef * Department of Computer Science, Ben Gurion University,

More information

BASIC ABOUT TYPE TYPO GRAPHY

BASIC ABOUT TYPE TYPO GRAPHY BASIC ABOUT TYPE TYPO GRAPHY TYPOGRAPHY BASIC DESIGN Relative & Absolute measurements Absolute measurements Inche : Millimetres : Points : Pica 3 Inches 76.2 mm 216 Points 18 Picas 1 Inches = 3 Picas A

More information

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions Data In single-program multiple-data (SPMD) parallel programs, global data is partitioned, with a portion of the data assigned to each processing node. Issues relevant to choosing a partitioning strategy

More information

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter

More information

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov

Structured Light II. Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Structured Light II Johannes Köhler Johannes.koehler@dfki.de Thanks to Ronen Gvili, Szymon Rusinkiewicz and Maks Ovsjanikov Introduction Previous lecture: Structured Light I Active Scanning Camera/emitter

More information

A Document Image Analysis System on Parallel Processors

A Document Image Analysis System on Parallel Processors A Document Image Analysis System on Parallel Processors Shamik Sural, CMC Ltd. 28 Camac Street, Calcutta 700 016, India. P.K.Das, Dept. of CSE. Jadavpur University, Calcutta 700 032, India. Abstract This

More information

Topic 4 Image Segmentation

Topic 4 Image Segmentation Topic 4 Image Segmentation What is Segmentation? Why? Segmentation important contributing factor to the success of an automated image analysis process What is Image Analysis: Processing images to derive

More information

Assignment 2. Classification and Regression using Linear Networks, Multilayer Perceptron Networks, and Radial Basis Functions

Assignment 2. Classification and Regression using Linear Networks, Multilayer Perceptron Networks, and Radial Basis Functions ENEE 739Q: STATISTICAL AND NEURAL PATTERN RECOGNITION Spring 2002 Assignment 2 Classification and Regression using Linear Networks, Multilayer Perceptron Networks, and Radial Basis Functions Aravind Sundaresan

More information

This chapter will show how to organize data and then construct appropriate graphs to represent the data in a concise, easy-to-understand form.

This chapter will show how to organize data and then construct appropriate graphs to represent the data in a concise, easy-to-understand form. CHAPTER 2 Frequency Distributions and Graphs Objectives Organize data using frequency distributions. Represent data in frequency distributions graphically using histograms, frequency polygons, and ogives.

More information

Mobile Camera Based Text Detection and Translation

Mobile Camera Based Text Detection and Translation Mobile Camera Based Text Detection and Translation Derek Ma Qiuhau Lin Tong Zhang Department of Electrical EngineeringDepartment of Electrical EngineeringDepartment of Mechanical Engineering Email: derekxm@stanford.edu

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

Hashing. Hashing Procedures

Hashing. Hashing Procedures Hashing Hashing Procedures Let us denote the set of all possible key values (i.e., the universe of keys) used in a dictionary application by U. Suppose an application requires a dictionary in which elements

More information

Improved Optical Recognition of Bangla Characters

Improved Optical Recognition of Bangla Characters SUST Studies, Vol. 12, No. 1, 2010; P:69-78 Improved Optical Recognition of Bangla Characters Md. Mahbubul Haque, A.Q. M. Saiful Islam, Md. Mahadi Hasan and M. Shahidur Rahman Department of Computer Science

More information

Segmentation and Grouping

Segmentation and Grouping Segmentation and Grouping How and what do we see? Fundamental Problems ' Focus of attention, or grouping ' What subsets of pixels do we consider as possible objects? ' All connected subsets? ' Representation

More information

Segmentation algorithm for monochrome images generally are based on one of two basic properties of gray level values: discontinuity and similarity.

Segmentation algorithm for monochrome images generally are based on one of two basic properties of gray level values: discontinuity and similarity. Chapter - 3 : IMAGE SEGMENTATION Segmentation subdivides an image into its constituent s parts or objects. The level to which this subdivision is carried depends on the problem being solved. That means

More information

2.1: Frequency Distributions and Their Graphs

2.1: Frequency Distributions and Their Graphs 2.1: Frequency Distributions and Their Graphs Frequency Distribution - way to display data that has many entries - table that shows classes or intervals of data entries and the number of entries in each

More information

Formatting Text. 05_Format rd July 2000

Formatting Text. 05_Format rd July 2000 05_Format 1.00 23rd July 2000 5 Formatting Text 5.1... Applying Format Effects................................. 52 5.2... Alignment............................................ 53 5.3... Leading..............................................

More information

Scalable Trigram Backoff Language Models

Scalable Trigram Backoff Language Models Scalable Trigram Backoff Language Models Kristie Seymore Ronald Rosenfeld May 1996 CMU-CS-96-139 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 This material is based upon work

More information

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor COSC160: Detection and Classification Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Problem I. Strategies II. Features for training III. Using spatial information? IV. Reducing dimensionality

More information

Real-time Detection of Illegally Parked Vehicles Using 1-D Transformation

Real-time Detection of Illegally Parked Vehicles Using 1-D Transformation Real-time Detection of Illegally Parked Vehicles Using 1-D Transformation Jong Taek Lee, M. S. Ryoo, Matthew Riley, and J. K. Aggarwal Computer & Vision Research Center Dept. of Electrical & Computer Engineering,

More information

OTCYMIST: Otsu-Canny Minimal Spanning Tree for Born-Digital Images

OTCYMIST: Otsu-Canny Minimal Spanning Tree for Born-Digital Images OTCYMIST: Otsu-Canny Minimal Spanning Tree for Born-Digital Images Deepak Kumar and A G Ramakrishnan Medical Intelligence and Language Engineering Laboratory Department of Electrical Engineering, Indian

More information

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106 CHAPTER 6 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform Page No 6.1 Introduction 103 6.2 Compression Techniques 104 103 6.2.1 Lossless compression 105 6.2.2 Lossy compression

More information

GENERAL AUTOMATED FLAW DETECTION SCHEME FOR NDE X-RAY IMAGES

GENERAL AUTOMATED FLAW DETECTION SCHEME FOR NDE X-RAY IMAGES GENERAL AUTOMATED FLAW DETECTION SCHEME FOR NDE X-RAY IMAGES Karl W. Ulmer and John P. Basart Center for Nondestructive Evaluation Department of Electrical and Computer Engineering Iowa State University

More information

A System to Automatically Index Genealogical Microfilm Titleboards Introduction Preprocessing Method Identification

A System to Automatically Index Genealogical Microfilm Titleboards Introduction Preprocessing Method Identification A System to Automatically Index Genealogical Microfilm Titleboards Samuel James Pinson, Mark Pinson and William Barrett Department of Computer Science Brigham Young University Introduction Millions of

More information

Text Area Detection from Video Frames

Text Area Detection from Video Frames Text Area Detection from Video Frames 1 Text Area Detection from Video Frames Xiangrong Chen, Hongjiang Zhang Microsoft Research China chxr@yahoo.com, hjzhang@microsoft.com Abstract. Text area detection

More information

Performance Characterization in Computer Vision

Performance Characterization in Computer Vision Performance Characterization in Computer Vision Robert M. Haralick University of Washington Seattle WA 98195 Abstract Computer vision algorithms axe composed of different sub-algorithms often applied in

More information

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1 Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes t Line Attributes Fill-Area Attributes Scan-Line

More information

What is an edge? Paint. Depth discontinuity. Material change. Texture boundary

What is an edge? Paint. Depth discontinuity. Material change. Texture boundary EDGES AND TEXTURES The slides are from several sources through James Hays (Brown); Srinivasa Narasimhan (CMU); Silvio Savarese (U. of Michigan); Bill Freeman and Antonio Torralba (MIT), including their

More information

I. INTRODUCTION. Figure-1 Basic block of text analysis

I. INTRODUCTION. Figure-1 Basic block of text analysis ISSN: 2349-7637 (Online) (RHIMRJ) Research Paper Available online at: www.rhimrj.com Detection and Localization of Texts from Natural Scene Images: A Hybrid Approach Priyanka Muchhadiya Post Graduate Fellow,

More information

3D Computer Vision. Structured Light II. Prof. Didier Stricker. Kaiserlautern University.

3D Computer Vision. Structured Light II. Prof. Didier Stricker. Kaiserlautern University. 3D Computer Vision Structured Light II Prof. Didier Stricker Kaiserlautern University http://ags.cs.uni-kl.de/ DFKI Deutsches Forschungszentrum für Künstliche Intelligenz http://av.dfki.de 1 Introduction

More information

SEVERAL METHODS OF FEATURE EXTRACTION TO HELP IN OPTICAL CHARACTER RECOGNITION

SEVERAL METHODS OF FEATURE EXTRACTION TO HELP IN OPTICAL CHARACTER RECOGNITION SEVERAL METHODS OF FEATURE EXTRACTION TO HELP IN OPTICAL CHARACTER RECOGNITION Binod Kumar Prasad * * Bengal College of Engineering and Technology, Durgapur, W.B., India. Rajdeep Kundu 2 2 Bengal College

More information

B. Graphing Representation of Data

B. Graphing Representation of Data B Graphing Representation of Data The second way of displaying data is by use of graphs Although such visual aids are even easier to read than tables, they often do not give the same detail It is essential

More information

SYDE Winter 2011 Introduction to Pattern Recognition. Clustering

SYDE Winter 2011 Introduction to Pattern Recognition. Clustering SYDE 372 - Winter 2011 Introduction to Pattern Recognition Clustering Alexander Wong Department of Systems Design Engineering University of Waterloo Outline 1 2 3 4 5 All the approaches we have learned

More information

The Effect of Inverse Document Frequency Weights on Indexed Sequence Retrieval. Kevin C. O'Kane. Department of Computer Science

The Effect of Inverse Document Frequency Weights on Indexed Sequence Retrieval. Kevin C. O'Kane. Department of Computer Science The Effect of Inverse Document Frequency Weights on Indexed Sequence Retrieval Kevin C. O'Kane Department of Computer Science The University of Northern Iowa Cedar Falls, Iowa okane@cs.uni.edu http://www.cs.uni.edu/~okane

More information

Automatic Detection of Change in Address Blocks for Reply Forms Processing

Automatic Detection of Change in Address Blocks for Reply Forms Processing Automatic Detection of Change in Address Blocks for Reply Forms Processing K R Karthick, S Marshall and A J Gray Abstract In this paper, an automatic method to detect the presence of on-line erasures/scribbles/corrections/over-writing

More information

CHAPTER 4: MICROSOFT OFFICE: EXCEL 2010

CHAPTER 4: MICROSOFT OFFICE: EXCEL 2010 CHAPTER 4: MICROSOFT OFFICE: EXCEL 2010 Quick Summary A workbook an Excel document that stores data contains one or more pages called a worksheet. A worksheet or spreadsheet is stored in a workbook, and

More information

Alphabet. elemental visual signs 26 characters frozen sounds

Alphabet. elemental visual signs 26 characters frozen sounds Alphabet elemental visual signs 26 characters frozen sounds Evolution Handwriting > minimum number of strokes Engraving > lowercase > minimum number of curved lines > capitals Letterforms Appearance of

More information

eschoolplus+ Cognos Query Studio Training Guide Version 2.4

eschoolplus+ Cognos Query Studio Training Guide Version 2.4 + Training Guide Version 2.4 May 2015 Arkansas Public School Computer Network This page was intentionally left blank Page 2 of 68 Table of Contents... 5 Accessing... 5 Working in Query Studio... 8 Query

More information

Segmentation and Tracking of Partial Planar Templates

Segmentation and Tracking of Partial Planar Templates Segmentation and Tracking of Partial Planar Templates Abdelsalam Masoud William Hoff Colorado School of Mines Colorado School of Mines Golden, CO 800 Golden, CO 800 amasoud@mines.edu whoff@mines.edu Abstract

More information

Frequency Distributions

Frequency Distributions Displaying Data Frequency Distributions After collecting data, the first task for a researcher is to organize and summarize the data so that it is possible to get a general overview of the results. Remember,

More information

Probability Models.S4 Simulating Random Variables

Probability Models.S4 Simulating Random Variables Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard Probability Models.S4 Simulating Random Variables In the fashion of the last several sections, we will often create probability

More information

Query Studio Training Guide Cognos 8 February 2010 DRAFT. Arkansas Public School Computer Network 101 East Capitol, Suite 101 Little Rock, AR 72201

Query Studio Training Guide Cognos 8 February 2010 DRAFT. Arkansas Public School Computer Network 101 East Capitol, Suite 101 Little Rock, AR 72201 Query Studio Training Guide Cognos 8 February 2010 DRAFT Arkansas Public School Computer Network 101 East Capitol, Suite 101 Little Rock, AR 72201 2 Table of Contents Accessing Cognos Query Studio... 5

More information

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VI (Nov Dec. 2014), PP 29-33 Analysis of Image and Video Using Color, Texture and Shape Features

More information

HOUGH TRANSFORM CS 6350 C V

HOUGH TRANSFORM CS 6350 C V HOUGH TRANSFORM CS 6350 C V HOUGH TRANSFORM The problem: Given a set of points in 2-D, find if a sub-set of these points, fall on a LINE. Hough Transform One powerful global method for detecting edges

More information

CS229 Lecture notes. Raphael John Lamarre Townshend

CS229 Lecture notes. Raphael John Lamarre Townshend CS229 Lecture notes Raphael John Lamarre Townshend Decision Trees We now turn our attention to decision trees, a simple yet flexible class of algorithms. We will first consider the non-linear, region-based

More information

STATS PAD USER MANUAL

STATS PAD USER MANUAL STATS PAD USER MANUAL For Version 2.0 Manual Version 2.0 1 Table of Contents Basic Navigation! 3 Settings! 7 Entering Data! 7 Sharing Data! 8 Managing Files! 10 Running Tests! 11 Interpreting Output! 11

More information

Localization, Extraction and Recognition of Text in Telugu Document Images

Localization, Extraction and Recognition of Text in Telugu Document Images Localization, Extraction and Recognition of Text in Telugu Document Images Atul Negi Department of CIS University of Hyderabad Hyderabad 500046, India atulcs@uohyd.ernet.in K. Nikhil Shanker Department

More information

Towards Automatic Recognition of Fonts using Genetic Approach

Towards Automatic Recognition of Fonts using Genetic Approach Towards Automatic Recognition of Fonts using Genetic Approach M. SARFRAZ Department of Information and Computer Science King Fahd University of Petroleum and Minerals KFUPM # 1510, Dhahran 31261, Saudi

More information

A New Technique for Segmentation of Handwritten Numerical Strings of Bangla Language

A New Technique for Segmentation of Handwritten Numerical Strings of Bangla Language I.J. Information Technology and Computer Science, 2013, 05, 38-43 Published Online April 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2013.05.05 A New Technique for Segmentation of Handwritten

More information

At the end of the chapter, you will learn to: Present data in textual form. Construct different types of table and graphs

At the end of the chapter, you will learn to: Present data in textual form. Construct different types of table and graphs DATA PRESENTATION At the end of the chapter, you will learn to: Present data in textual form Construct different types of table and graphs Identify the characteristics of a good table and graph Identify

More information

Hidden Loop Recovery for Handwriting Recognition

Hidden Loop Recovery for Handwriting Recognition Hidden Loop Recovery for Handwriting Recognition David Doermann Institute of Advanced Computer Studies, University of Maryland, College Park, USA E-mail: doermann@cfar.umd.edu Nathan Intrator School of

More information

Chapter 2 - Graphical Summaries of Data

Chapter 2 - Graphical Summaries of Data Chapter 2 - Graphical Summaries of Data Data recorded in the sequence in which they are collected and before they are processed or ranked are called raw data. Raw data is often difficult to make sense

More information

Rough Set Approach to Unsupervised Neural Network based Pattern Classifier

Rough Set Approach to Unsupervised Neural Network based Pattern Classifier Rough Set Approach to Unsupervised Neural based Pattern Classifier Ashwin Kothari, Member IAENG, Avinash Keskar, Shreesha Srinath, and Rakesh Chalsani Abstract Early Convergence, input feature space with

More information

Lecture 9: Hough Transform and Thresholding base Segmentation

Lecture 9: Hough Transform and Thresholding base Segmentation #1 Lecture 9: Hough Transform and Thresholding base Segmentation Saad Bedros sbedros@umn.edu Hough Transform Robust method to find a shape in an image Shape can be described in parametric form A voting

More information

Lecture Slides. Elementary Statistics Twelfth Edition. by Mario F. Triola. and the Triola Statistics Series. Section 2.1- #

Lecture Slides. Elementary Statistics Twelfth Edition. by Mario F. Triola. and the Triola Statistics Series. Section 2.1- # Lecture Slides Elementary Statistics Twelfth Edition and the Triola Statistics Series by Mario F. Triola Chapter 2 Summarizing and Graphing Data 2-1 Review and Preview 2-2 Frequency Distributions 2-3 Histograms

More information

Introduction to Medical Imaging (5XSA0) Module 5

Introduction to Medical Imaging (5XSA0) Module 5 Introduction to Medical Imaging (5XSA0) Module 5 Segmentation Jungong Han, Dirk Farin, Sveta Zinger ( s.zinger@tue.nl ) 1 Outline Introduction Color Segmentation region-growing region-merging watershed

More information

ABJAD: AN OFF-LINE ARABIC HANDWRITTEN RECOGNITION SYSTEM

ABJAD: AN OFF-LINE ARABIC HANDWRITTEN RECOGNITION SYSTEM ABJAD: AN OFF-LINE ARABIC HANDWRITTEN RECOGNITION SYSTEM RAMZI AHMED HARATY and HICHAM EL-ZABADANI Lebanese American University P.O. Box 13-5053 Chouran Beirut, Lebanon 1102 2801 Phone: 961 1 867621 ext.

More information

A Line Drawings Degradation Model for Performance Characterization

A Line Drawings Degradation Model for Performance Characterization A Line Drawings Degradation Model for Performance Characterization 1 Jian Zhai, 2 Liu Wenin, 3 Dov Dori, 1 Qing Li 1 Dept. of Computer Engineering and Information Technolog; 2 Dept of Computer Science

More information

Vivekananda. Collegee of Engineering & Technology. Question and Answers on 10CS762 /10IS762 UNIT- 5 : IMAGE ENHANCEMENT.

Vivekananda. Collegee of Engineering & Technology. Question and Answers on 10CS762 /10IS762 UNIT- 5 : IMAGE ENHANCEMENT. Vivekananda Collegee of Engineering & Technology Question and Answers on 10CS762 /10IS762 UNIT- 5 : IMAGE ENHANCEMENT Dept. Prepared by Harivinod N Assistant Professor, of Computer Science and Engineering,

More information

Chapter 1. Looking at Data-Distribution

Chapter 1. Looking at Data-Distribution Chapter 1. Looking at Data-Distribution Statistics is the scientific discipline that provides methods to draw right conclusions: 1)Collecting the data 2)Describing the data 3)Drawing the conclusions Raw

More information

5. Feature Extraction from Images

5. Feature Extraction from Images 5. Feature Extraction from Images Aim of this Chapter: Learn the Basic Feature Extraction Methods for Images Main features: Color Texture Edges Wie funktioniert ein Mustererkennungssystem Test Data x i

More information

Math 227 EXCEL / MEGASTAT Guide

Math 227 EXCEL / MEGASTAT Guide Math 227 EXCEL / MEGASTAT Guide Introduction Introduction: Ch2: Frequency Distributions and Graphs Construct Frequency Distributions and various types of graphs: Histograms, Polygons, Pie Charts, Stem-and-Leaf

More information

EE368 Project: Visual Code Marker Detection

EE368 Project: Visual Code Marker Detection EE368 Project: Visual Code Marker Detection Kahye Song Group Number: 42 Email: kahye@stanford.edu Abstract A visual marker detection algorithm has been implemented and tested with twelve training images.

More information

Dr. Ulas Bagci

Dr. Ulas Bagci CAP5415-Computer Vision Lecture 11-Image Segmentation (BASICS): Thresholding, Region Growing, Clustering Dr. Ulas Bagci bagci@ucf.edu 1 Image Segmentation Aim: to partition an image into a collection of

More information

Image Segmentation for Image Object Extraction

Image Segmentation for Image Object Extraction Image Segmentation for Image Object Extraction Rohit Kamble, Keshav Kaul # Computer Department, Vishwakarma Institute of Information Technology, Pune kamble.rohit@hotmail.com, kaul.keshav@gmail.com ABSTRACT

More information